Non-wire contact device application for cryptographic module interfaces
First Claim
1. An apparatus for providing cryptographic services to a host, the apparatus comprising:
- at least one non-contact cryptographic data receiver for receiving cryptographic data through at least one non-contact interface, the cryptographic data for use to provide at least one cryptographic service on separate host data;
a host data receiver different from the at least one non-contact cryptographic data receiver, for receiving host data from a host; and
a central processing unit (CPU) having memory and programming for receiving cryptographic data from the at least one cryptographic data receiver and host data from the host data receiver and processing said data to provide at least one cryptographic service using said cryptographic data on the host data to produce output data.
10 Assignments
0 Petitions
Accused Products
Abstract
Non-contact interfaces to cryptographic modules include non-contact inputs, which may contain magnetic coupling, RF coupling, infrared coupling, optical coupling or acoustical coupling to load cryptographic data into cryptographic modules. By using non-contact methods of coupling, the physical inputs to the module can be hidden, as no external connectors to input cryptographic data are required. In addition, several non-contact inputs can be disposed within a cryptographic module, at orientations and spacings which require the specific placement of transmitting units, thereby increasing the security of the module. In addition, by having several inputs to the cryptographic module, the cryptographic function may be made to be dependent on a sequencing of data between the inputs and/or may require simultaneous inputs on two or more sensors.
32 Citations
60 Claims
-
1. An apparatus for providing cryptographic services to a host, the apparatus comprising:
-
at least one non-contact cryptographic data receiver for receiving cryptographic data through at least one non-contact interface, the cryptographic data for use to provide at least one cryptographic service on separate host data;
a host data receiver different from the at least one non-contact cryptographic data receiver, for receiving host data from a host; and
a central processing unit (CPU) having memory and programming for receiving cryptographic data from the at least one cryptographic data receiver and host data from the host data receiver and processing said data to provide at least one cryptographic service using said cryptographic data on the host data to produce output data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A security module for providing security services, the security module comprising:
-
at least one non-contact interface for receiving security data to use to provide at least one security service on separate host data;
a host interface different from the at least one non-contact interface, the host interface for receiving host data from a host computing system;
a processor configured to provide said at least one security service using said security data on the host data. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A process for providing security services, comprising:
-
receiving security data through at least one non-contact interface, the security data for use in providing at least one security service on separate host data;
receiving host data from a host computing system through a host interface that is different from said non-contact interface; and
providing said at least one security service using said security data on host data received from a host computing system. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A security system for providing security services on host data, the security system comprising:
-
a security module having at least one non-contact interface for receiving security data to use to provide at least one security service on separate host data, a host interface different from the at least one non-contact interface for receiving host data, and a processor configured to provide said at least one security service using said security data on the host data; and
a load module having at least one non-contact output port for providing security data to the at least one non-contact interface of the security module. - View Dependent Claims (51, 52, 53, 54)
-
-
55. A security module for providing security services on host data, the security module comprising:
-
at least one receiver for receiving two different communications of information;
a processor operatively coupled to the receiver and configured for employing at least a portion of each of the two communications of information to produce security data and for providing at least one security service, using the security data on the host data. - View Dependent Claims (56, 57, 58, 60)
-
-
59. A security module as recited in clam 56, wherein a first one of the two communications of information comprises a communication of a first decoding key, wherein the second one of the two communications of information comprises a communication of a second decoding key, and wherein the host data may be decoded by combining the first and second decoding keys and applying the combination in a decoding process.
Specification